Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
1 Audio Compression Techniques MUMT 611, January 2005 Assignment 2 Paul Kolesnik.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
JPEG Still Image Data Compression Standard
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s: Communications and Information Systems 1 WATERLOO ELECTRICAL AND COMPUTER ENGINEERING 10s Communications.
Roger Cheng (JPEG slides courtesy of Brian Bailey) Spring 2007
1 JPEG Compression CSC361/661 Burg/Wong. 2 Fact about JPEG Compression JPEG stands for Joint Photographic Experts Group JPEG compression is used with.jpg.
Image Compression JPEG. Fact about JPEG Compression JPEG stands for Joint Photographic Experts Group JPEG compression is used with.jpg and can be embedded.
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
A Review on: Spread Spectrum Watermarking Techniques
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Perceptual Watermarks for Digital Image and Video ECE 738 paper presentation Pei Qi ECE at UW-Madison
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Compression is the reduction in size of data in order to save space or transmission time. And its used just about everywhere. All the images you get on.
Introduction to JPEG Alireza Shafaei ( ) Fall 2005.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
LECTURE Copyright  1998, Texas Instruments Incorporated All Rights Reserved Encoding of Waveforms Encoding of Waveforms to Compress Information.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
CIS679: Multimedia Basics r Multimedia data type r Basic compression techniques.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
IMAGE FORGERY DETECTION Submitted by Deepika Dileep Deepika Dileep S7 IT N0:35 N0:35.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Presentation III Irvanda Kurniadi V. ( )
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
DEPARTMENT OF ECE, BEC, BAGALKOT
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
High Capacity Data Embedding in JPEG Bit Streams Using Visual Models
DONE BY S.MURALIRAJAN M.NIRMAL
Image Transforms for Robust Coding
Parag Agarwal Digital Watermarking Parag Agarwal
Govt. Polytechnic Dhangar(Fatehabad)
Presentation transcript:

Digital Watermarking

Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible (noise) –Information Hiding Covert communication channel (steganography)

Digital Watermarking Media Video Audio Images –Our discussion will focus on this. Watermarking Algorithm Watermarked Image Original Image Watermark Block Diagram of image watermarking

Applications Copyright –The objective is to permanently and unalterably mark the image so that the credit or assignment is beyond dispute. Digital Rights –A file may only be used by users with a license that matches the watermarked signature. Information Hiding –Foil counterfeiters Revision History –Tamper detection Meta-tagging –Store keywords, descriptions, time along with images.

Criteria Main Criteria –Capacity –Payload –Computational Complexity –Transparency –Robustness Require optimum relationship

Capacity The ability to detect watermarks with a low probability of error as the number of watermarks in a single image increases.

Payload The amount of information that can be legitimately stored within a data stream –Dependent on host medium –JPEG example

Computational Complexity Difficulty in process of watermark extraction –Realtime?

Transparency Transparency refers to the perceptual quality of the data being protected. –Watermark should be invisible over all image types as well as local image characteristics. Need to consider perceptually insignificant portion of host image for insertion for maximum transparency

Robustness Resistance to attacks on the watermark –Attack – an operation performed on the image that compromises the watermark –Active, Passive, Collusion, Forgery –Blind vs. Nonblind Use of non-robust watermarks –eg. tamper detection

Approaches and Implementation Two Types of Encoding –Spatial watermarking (spatial domain) –Spectral watermarking (frequency-domain) Many types due to variety of transforms Adjustments made in frequency domain More robust

Spatial-Domain Implementation Low-level Encoding Use of Image Analysis Operations –eg. Edge Detection/Color Separation Cons –Easily Attacked (Cropping)

Frequency-Domain Implementation Algorithm –Decomposition of image –Addition of Watermark Possibly encoded/encrypted –Re-composition of Image

Frequency-Domain Implementation (Discrete Cosine Transform) Discrete Cosine Transform (DCT) –Used in today’s standard JPEG compression Relation to DFT Compression explained by previous groups –Image divided into non-overlapping blocks –Each block is DC transformed –Block coefficients are quantized through a special algorithm Not ideal for human visual system

Frequency-Domain Implementation (Wavelet Transform) Wavelet Transform –Based on Short Time Fourier Transform (STFT) –Becoming more common in compression techniques Better model of Human Visual System than DCT

Examples of Wavelets

Frequency-Domain Implementation (Common Wavelet Transform Algorithm - Decomposition) Filter Bank Decomposition (10 Bands)

Frequency-Domain Implementation (Wavelet Transform Algorithm - Overview) Watermarked Image Encoded Watermark

Frequency-Domain Implementation (Cortex Transform) Cortex Transform –Recent –Mimics human visual system Corresponds to known structure of human eye –Has its own disadvantages Computational complexity – requires much more data!

Other Issues Just Noticeable Difference (JND) –Threshold based on Human Visual System Adjustment in Frequency Adjustments in Intensity –Important impact on transparency Spatial adjustment of Frequency-Domain Watermark

Spread Spectrum Used to fulfill transparency criterion The watermark in is based on spread spectrum communications –Delivers narrowband data through a noisy channel, by modulating each data symbol with a wideband (but very low amplitude) signal. –The data is a single bit – a yes or no decision on whether the given watermark is present. –The channel is the image data itself –The wideband signal is the watermark.

Color Images Scheme nearly identical to grayscale –R/G/B channels Each color plane treated as a separate image –Luminance/Chrominance channels Luminance = intensity Chrominance = color

Resources ftp://skynet.ecn.purdue.edu/pub/dist/delp/watermark-proceedings/paper.pdf Mihcak, Mehmet Kivanc. “Information Hiding Codes and Their Applications to Images and Audio”, PhD Thesis